Malware Analysis and Intrusion Detection in Cyber-Physical Systems

Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant r...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via ProQuest)
Main Author: Shiva Darshan, S. L.
Other Authors: Manoj Kumar, M. V., Prashanth, B. S., Vishnu Srinivasa Murthy, Y.
Format: Electronic eBook
Language:English
Published: Hershey : IGI Global, 2023.
Table of Contents:
  • Title Page
  • Copyright Page
  • Book Series
  • Table of Contents
  • Detailed Table of Contents
  • Preface
  • Chapter 1: Introduction to the Cyber-Security Landscape
  • Chapter 2: Foundation of Malware Analysis and Detection
  • Chapter 3: Malware Analysis and Classification
  • Chapter 4: Wrapper-Based Feature Selection for Detecting the Lexical Phishing Websites Using Ensemble Learning Algorithms
  • Chapter 5: Classification of Firewall Log Files Using Supervised Machine Learning Techniques
  • Chapter 6: Discernment and Perusal of Software Vulnerability
  • Chapter 7: Knowledge Repository on Cyber Security
  • Chapter 8: Impact of Information Leakage and Conserving Digital Privacy
  • Chapter 9: Intrusion Detection in Cyber Physical Systems Using Multichain
  • Chapter 10: Malware Analysis With Machine Learning
  • Chapter 11: Malware Forensics Analysis and Detection in Cyber Physical Systems
  • Chapter 12: Malware Analysis and Its Mitigation Tools
  • Chapter 13: Malware Forensics
  • Chapter 14: Malware Detection Using Yara Rules in SIEM
  • Chapter 15: Malware Mitigation Tools
  • Chapter 16: The Future of Cyber Security Starts Today, Not Tomorrow
  • Compilation of References
  • About the Contributors
  • Index